Search
Submission Procedure
share:
|
Special Issues
Submission Procedure
Aims and Scope
Board of Editors
What's New
Follow us
Articles by Topics
Articles by Author
Geographical Mashup
List of Topics
Printed Publications
Volume 26 (2020)
Volume 25 (2019)
Volume 24 (2018)
Volume 23 (2017)
Volume 22 (2016)
Volume 21 (2015)
Volume 20 (2014)
Volume 19 (2013)
Volume 18 (2012)
Volume 17 (2011)
Volume 16 (2010)
Volume 15 (2009)
Volume 14 (2008)
Issue 1
Issue 2
Issue 3
Issue 4
Issue 5
Issue 6
Issue 7
Issue 8
Issue 9
Issue 10
Issue 11
Issue 12
Issue 13
Issue 14
Issue 15
Issue 16
Issue 17
Issue 18
Issue 19
Issue 20
Issue 21
Issue 22
Volume 13 (2007)
Volume 12 (2006)
Volume 11 (2005)
Volume 10 (2004)
Volume 9 (2003)
Volume 8 (2002)
Volume 7 (2001)
Volume 6 (2000)
Volume 5 (1999)
Volume 4 (1998)
Volume 3 (1997)
Volume 2 (1996)
Volume 1 (1995)
Volume 0 (1994)
Collection of other papers
Volume 14
Content of Issue 3
DOI:
10.3217/jucs-014-03
Cryptography in Computer System Security
L. Chen, W. Susilo, H. Wang, D.S. Wong, E. Dawson, X. Lai, M. Mambo, A. Miyaji, Y. Mu, D. Pointcheval, B. Preneel, N. Smart
314
Optimistic Fair Exchange in a Multi-user Setting
Y. Dodis, P.J. Lee, D.H. Yum
318
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
C. Rechberger, V. Rijmen
347
Parallel Key Exchange
I.R. Jeong, D.H. Lee
377
Efficient k-out-of-n Oblivious Transfer Schemes
C.-K. Chu, W.-G. Tzeng
397
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
L. Chen, Q. Tang
416
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
G. Yang, D.S. Wong, X. Deng
441
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
Y.H. Hwang, J.K. Liu, S.S. Chow
463
Parallel Formulations of Scalar Multiplication on Koblitz Curves
O. Ahmadi, D. Hankerson,
F. RodrĂguez-HenrĂquez
481